History Applications Attacks Advantages & Disadvantages Conclusion.

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

Lect. 8 : Advanced Encryption Standard
Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Conventional Encryption: Algorithms
Chapter 3  Symmetric Key Cryptosystems 1 Overview  Modern symmetric-key cryptosystems o Data Encryption Standard (DES)  Adopted in 1976  Block size.
Doc.: IEEE /037 Submission March 2000 Duncan Kitchin, Jesse Walker, Intel NIDSlide 1 Proposal for Enhanced Encryption Duncan Kitchin Jesse Walker.
Modern Cryptography.
Cryptography and Network Security
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Advanced Encryption Standard(AES) Presented by: Venkata Marella Slide #9-1.
AES clear a replacement for DES was needed
CSE331: Introduction to Networks and Security Lecture 18 Fall 2002.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
1 CS 255 Lecture 4 Attacks on Block Ciphers Brent Waters.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and block lengths defined, to behave as good as can be expected from.
Kevin Orr JT Schratz AES ENCRYPTION. OVERVIEW History Algorithm Uses Brute Force Attack.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
DARPA AES Finalist Algorithm: The Rijndael Block Cipher Mel Tsai University of California at Berkeley.
Blowfish A widely used block cipher. Blowfish Designed by Bruce Schneier (1993) A variant of it (Twofish) was an AES finalist candidate 64-bit block size,
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Cryptography Lecture 4 Stefan Dziembowski
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
FORESEC Academy FORESEC Academy Security Essentials (IV)
Information Security Lab. Dept. of Computer Engineering 122/151 PART I Symmetric Ciphers CHAPTER 5 Advanced Encryption Standard 5.1 Evaluation Criteria.
Rijndael Advanced Encryption Standard. Overview Definitions Definitions Who created Rijndael and the reason behind it Who created Rijndael and the reason.
Dan Boneh Block ciphers More attacks on block ciphers Online Cryptography Course Dan Boneh.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
The Latest Attacks on AES Mehrdad Abdi 1 بسم الله الرحمن الرحیم.
CS555Spring 2012/Topic 101 Cryptography CS 555 Topic 10: Block Cipher Security & AES.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Breaking RSA Encryption Nick Manners. History of Cryptography  Used to be strictly in the domain of governments… state secrets.  Particularly important.
The Advanced Encryption Standard Part 1: Overview
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Zong-Cing Lin 2007/10/31.  Algorithm Description  Why chose Rijndael  Reference.
CSE565: Computer Security Lectures 5 & 6 Advanced Encryption Standard
Information Security and Management (Abstract) 5
Triple DES.
School of Computer Science and Engineering Pusan National University
HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA. HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA.
Symmetric Key Block Ciphers
Cryptography and Network Security
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Advanced Encryption Standard
Advanced Encryption Standard
Modern Cryptography.
Advanced Encryption Standard
Blowfish Encryption Algorithm
Presentation transcript:

History Applications Attacks Advantages & Disadvantages Conclusion

Based on Rijndael algorithm Designed by Vincent Rijmen and Joan Daemen Successor of DES ( Why not Triple-DES )Triple-DES 128-bit key minimum

15 different designs 5 final nominees Rijndael (86 positive, 10 negative) Serpent (59 positive, 7 negative) Twofish (31 positive, 21 negative) RC6 (23 positive, 37 negative) MARS (13 positive, 83 negative)

A standard by NIST Archive and compression tools Disk encryption Local Area Network security Programming language C : Cryptography API C++: Botan, Crypto++ Java: Java Cryptography Extension (JCE) A standard by NIST Archive and compression tools Disk encryption Local Area Network security Programming language C : Cryptography API C++: Botan, Crypto++ Java: Java Cryptography Extension (JCE) On June 2003, AES 128-bit was approved for SECRET level document, and AES 256-bit approved for “TOP SECRET” level

Side channel attack Power analysis Timing analysis Fault analysis Acoustic analysis Radiation analysis (TEMPEST) Exhaustive search (Brute force attack) XSL attack ( Extended Sparse Linearization )

Published in 2002 Requiring fewer known plaintext Faster than an exhaustive search No real-world implementation “no one knows for certain if XSL can break Rijndael, and no one knows for certain that XSL cannot break Rijndael either..” Bruce Schneier, Twofish designer

Advantages Safe Brute Force (128 Bit = attempts) Unbreakable, for now.. Disadvantages Too simple algebraic structure

Will be used until there is any indication that the cipher system could be broken. Safe for now..

[1] AES : [2] WinZip AES Encryption Information: [3] AES Implementations: [4] Cryptosystem: [5] AES Animations: 05/blockciphers/rijndael_ingles2004.swfhttp:// 05/blockciphers/rijndael_ingles2004.swf [6] XSL Attack:

Thank you for your attention!

Very slow in software Unsuitable in limited resources platform Only 64 bits block size Back